Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CTS 234 Final Exam Latest Update With Complete Solution., Exams of Advanced Education

CTS 234 Final Exam Latest Update With Complete Solution

Typology: Exams

2024/2025

Available from 06/11/2025

belluna-skyler
belluna-skyler 🇺🇸

777 documents

1 / 18

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CTS 234 Final Exam Latest Update With
Complete Solution
Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V
Manager console, and Hyper-V PowerShell cmdlets. True or false? - ANSWER
True
Live Migration cannot be enabled if the Hyper-V host operating system is
joined to an Active Directory Domain. True or false? - ANSWER False
To replicate a virtual machine, it is sufficient that replication is enabled on
the Hyper-V host of the virtual machine that is being replicated. True or
false? - ANSWER False
You need multiple boot images on a WDS server, one for each operating
system. True or false? - ANSWER False
Ananya is installing the Hyper-V role on a server. When prompted for the
location of the virtual machine files, she changes the location from the
default value to E:\VMs.
Where will the virtual machine configuration files be stored? - ANSWER
E:\VMs\Virtual Machines
Dmitry installs the Hyper-V role using the Add Roles and Features Wizard.
Upon completion, he is prompted to reboot the computer. However, his
computer reboots twice.
Why does Dmitry's computer reboot the second time? - ANSWER To allow
Hyper-V to start the host operating system
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12

Partial preview of the text

Download CTS 234 Final Exam Latest Update With Complete Solution. and more Exams Advanced Education in PDF only on Docsity!

CTS 234 Final Exam Latest Update With

Complete Solution

Installing the Hyper-V role will install the Hyper-V hypervisor, Hyper-V Manager console, and Hyper-V PowerShell cmdlets. True or false? - ANSWER True

Live Migration cannot be enabled if the Hyper-V host operating system is joined to an Active Directory Domain. True or false? - ANSWER False

To replicate a virtual machine, it is sufficient that replication is enabled on the Hyper-V host of the virtual machine that is being replicated. True or false? - ANSWER False

You need multiple boot images on a WDS server, one for each operating system. True or false? - ANSWER False

Ananya is installing the Hyper-V role on a server. When prompted for the location of the virtual machine files, she changes the location from the default value to E:\VMs.

Where will the virtual machine configuration files be stored? - ANSWER E:\VMs\Virtual Machines

Dmitry installs the Hyper-V role using the Add Roles and Features Wizard. Upon completion, he is prompted to reboot the computer. However, his computer reboots twice.

Why does Dmitry's computer reboot the second time? - ANSWER To allow Hyper-V to start the host operating system

Block storage can easily be shared by several different Web apps, virtual machines, or containers. True or false? - ANSWER False

The IUSRS group in an Active Directory domain or workgroup is used to provide anonymous access to both website and Web app content. True or false? - ANSWER False

Container images that are based on Nano Server must be run as Hyper-V containers. True or false? - ANSWER True

LCOW requires that each Linux container run on a separate Linux kernel and achieves this by automatically running each Linux container as a Hyper-V container. True or false? - ANSWER True

To run a Windows Web app in a public cloud using SaaS, you will need to create, configure, and maintain the associated Windows Server 2019 virtual machine on the public cloud provider's hypervisor. True or false? - ANSWER False

TravelBugz is a website that reviews accommodations and holiday destinations. Users of the website can post their own reviews. Users can use the TravelBugz app too instead of the website if they want to. The app and website both directly access the Web app running on the cloud to store and retrieve data.

Which of the following is true of this scenario? - ANSWER The TravelBugz app communicates with the Web app using the TCP/IP protocol.

VLX Learning Media provides IT training solutions to corporates. For the lab activities in these training sessions, the company runs the lab setup on virtual machines. These virtual machines are hosted by another company, VirtualFMZ, on its servers, but VLX installs and manages the virtual machines,

on a platform managed by a cloud service provider.

Which of the following IIS role services is integral to the file-sharing feature in Kenshin's Web app? - ANSWER FTP Server

Maqsud installs IIS on a Windows Server 2019 server. To allows users to connect to Default Web Site using HTTPS, he installs an HTTPS encryption certificate on the Web server. Next, he configures Default Web Site to respond to HTTPS requests. However, when users connect to the website using HTTPS, they receive a security warning.

Which of the following is most likely causing this issue? - ANSWER The FQDN in the HTTPS certificate does not match the Web server FQDN.

Viola, a system administrator, installs IIS on a Web server and creates two websites. She installs the necessary HTTPS encryption certificate on the server and proceeds to bind the HTTPS protocol to the first website using default settings. This binding is successful. Next, she proceeds to bind the HTTPS protocol to the second website.

Which of the following is most likely to cause an issue when binding the HTTPS protocol to the second website? - ANSWER The first website is using port 443, so the second website cannot use the same port.

Britta, a system administrator, is managing a website that is running on an IIS web server. Recently, the website was redesigned, and some portions of the website were deleted. Search engines carry links to these deleted portions for specific searches. Britta wants to ensure that when users click on links to deleted portions of the website, they're redirected to a section of the website.

Which of the following IIS configuration features should Britta use? -

ANSWER Error Pages

Asher, a system administrator, wants to run containers on Windows Server

  1. He chooses to install Docker using the Windows containers component.

Which of the following is a service that will help Asher manage and run Docker containers on the server? - ANSWER Docker daemon

Ezra wants to install Docker on a Windows Server 2019 server. He has two options to download and install the Docker Enterprise Edition either Microsoft or Docker. He chooses to download the package using the DockerProvider Windows PowerShell module.

Which of the following justifies Ezra's choice? - ANSWER Ezra intends to run Linux containers on the server.

Valentina decides to install the Docker EE package on a Windows server. She wants to download the latest stable version of the package, so she chooses to install Docker using the DockerMsftProvider module. She enters the following commands in the Windows PowerShell window:

PS C:> Install-Module -Name DockerMsftProvider -XXXX psgallery -Force

PS C:> Install-Package -Name docker -ProviderName DockerMsftProvider

Identify the correct code that should replace XXXX. - ANSWER Repository

Mateo uses the following command to search Docker Hub for containers that have IIS installed: PS C:> docker search iis. The search returns the following options: microsoft/aspnet, microsoft/iis, nanoserver/iis. Mateo wants to download the latest version of the microsoft/iis container from Docker Hub.

Which of the following must be true if Theodore did not use the sudo command during the second round of administrative changes? - ANSWER Theodore used the sudo passwd root command.

Isabella installs a Fedora Linux distribution on a Windows Server 2019 server. Next, she installs the Apache Web server on this system. Because the server is also running IIS that uses port 80, Isabella modifies the port number for the Apache Web server.

Which of the following commands must Isabella run to ensure that she did not make a syntax error during the recent change? - ANSWER apachect configtest

You set up a Windows Server 2019 system and install the Docker EE package. The server also has IIS installed. Next, you enable LCOW and run a Linux container.

Which of the following is true of this scenario? - ANSWER The Linux kernel provided by Docker runs on the Hyper-V hypervisor.

You enable LCOW on a Windows Server 2019 system that already has IIS installed. The server is also used to run Windows containers. Next, you download and run some Linux containers. You disable LCOW and run the

docker images command.

What will be the result in this scenario? - ANSWER The list of Windows container images will be displayed.

Merlyn, a developer at Enigma Designs, wants to host a Windows Web app in a public cloud. She prefers to build the app and host it with a public cloud provider. She does not want to deal with the back-end configuration such as setting up the Windows Server 2019, IIS, and Web app frameworks.

Which of the following options should Merlyn choose? - ANSWER SaaS

Lin chooses to run a Windows Web app in a public cloud environment using IaaS. She wants to optimize the cost of running the application on the cloud.

Which of the following options should Lin choose? - ANSWER She should install a small footprint virtual machine.

When configuring the authentication methods for a remote access server, you should select the option Allow remote systems to connect without authentication. True or false? - ANSWER False

client computers are allowed access to the Internet by connecting to the DMZ. The DMZ is connected to a NAT router.

In this scenario, what is the device that will allow the NAT router to connect to the ISP using a last mile technology? - ANSWER Demarcation point

Which of the following is a necessary condition if you want to configure a reverse proxy instead of port forwarding on a NAT router to enable access to a remote access server? - ANSWER The NAT router should be a Next Generation Firewall

You are configuring a Windows Server 2016 VPN server using L2TP and NAT.

Which of the following is one of the ports that needs to be opened on the firewall for this configuration to work? - ANSWER 1701/TCP

Kyra has set up a remote access server (RAS) in her organization. She has also configured VPN access on the NAT router. Next, she needs to set up the client systems that will be allowed to access the RAS. Kyra wants to ensure that the client and server communicate using the most secure authentication method.

Which of the following methods should Kyra ensure is supported on both the

client and the server? - ANSWER Extensible Authentication Protocol (EAP)

An organization has published applications on its web servers. The applications are accessible to users in the organization when they are authenticated via Active Directory.

What RAS capability will allow the organization's applications to be accessible to users outside of the organization? - ANSWER Web Application Proxy

Lashonda, a system administrator, installs a remote access server in her organization. The remote access server is connected directly to the demarc. Additionally, the remote access server is configured as a NAT router.

When configuring the remote access server, which of the following is Lashonda most likely to do? - ANSWER She will select the Demand-dial connections service.

You are configuring a remote access server in your organization. You install the Direct Access and VPN (RAS) role service along with the Routing role service.

On the next configuration screen, which of the following services should you

Wilmer is creating a new remote access policy for the sales department in the organization. On the Specify Conditions screen of the wizard to create new policies, Wilmer selects the option to grant or deny access according to user dial-in properties.

In which of the following circumstances will this permission be used? - ANSWER When a user account has the Control access through NPS Network Policy option set

The users at Trembot Information Systems currently need to manually initiate a VPN connection when remotely accessing the organization's servers. Samir, a system administrator at Trembot, receives a request from multiple remote users to simplify the process of accessing the organization's servers.

Which of the following options should Samir use? - ANSWER DirectAccess

Noortje, an employee of Cutleaf Productions, is working from home. She restarts her laptop to install an operating system update. After the restart, the Noortje is able to access the organization's file server without initiating a connection to the VPN.

Which of the following is true of this scenario? - ANSWER The remote access

server also contains a network location server.

Damien is configuring DirectAccess for a group of users in his organization. One of the requirements is that the users should be able to access the resources in their organization's network through VPN, but they should use the default gateway on their physical network interface to access websites that are not on the organization's network.

Which of the following options should Damien configure on the Enable DirectAccess Wizard? - ANSWER Damien should not select the Use force tunneling option.

Kim has completed configuring DirectAccess on a remote access server in his organization. He also configures the users' computers and enables DirectAccess. While the laptop users are able to use DirectAccess, desktop users email Kim to let him know that they're unable to use DirectAccess.

If Kim is able to resolve this issue successfully, which of the following options on the Remote Access Setup pane did Kim use? - ANSWER Remote Clients

Hiro is working remotely. His current role requires him to access his organization's resources that are running on the remote access server. He opens the Microsoft Outlook application that is running on the remote access

What role service available through Remote Desktop Services enables clients to establish an encrypted connection to virtual desktops and RemoteApp programs to an RDS server through the Internet using HTTPS? - ANSWER Remote Desktop Gateway

Aria is setting up a Remote Desktop Services server to allow users remote access to the server.

At what point in the installation process should Aria reboot the server? - ANSWER After selecting the role services that Aria wants to install

Michaela is configuring Remote Desktop Services in her organization. She specifies the Remote Desktop Licensing server and proceeds to select the licensing mode.

If Michaela selects the Per User licensing mode, which of the following statements is true? - ANSWER Michaela's organization allows users to connect remotely using their personal computers.

After configuring the role services on the Remote Desktop server, Jabez creates a collection for the Marketing group in the organization. He specifies multiple remote access servers for the collection. One of the users, Marion,

complains to Jabez that whenever she connects to a Remote Desktop session and customizes the settings, these settings are not available to her on her next Remote Desktop session.

If Jabez is able to fix this issue while maintaining load balancing, which of the following statements is true? - ANSWER Jabez created a shared folder that is accessible to remote servers in the collection.

Rory is managing the Remote Desktop connections to a collection, CollectionX. Two users, Aaron_T and Kwan_J have active connections.

If Rory is able to view and interact with Kwan-J's desktop, which of the following statements is true? - ANSWER Rory used the Shadow option.

Isabella configures three virtual machines, VM1, VM2, AND VM3, on a Windows Server 2019 host. The host and VM1 are connected to a physical switch (external virtual switch). VM1 and VM2 are connected to a private virtual switch. VM2 and the host are connected to an internal virtual switch. VM3 is not connected to any switch. Isabella is building an application that provides clients access to confidential financial information in a secure database. Isabella chooses to run the application on the host server and decides to implement an N-tier security design to protect the database.